|
CJ 523 / CJ 603 Internet Vulnerabilities and Criminal Activity
Fall 2011
Course Reading & Lecture Schedule
Instructor: Susan E Traudt
Sue@ttsw.com / STraudt@newhaven.edu
|
|
All readings should be completed before class
|
Course Introduction, Structure of Communication on the Internet
Week 1
Reading:
Recommended:
Lecture - Lecture12011.ppt
Assignments:
What is cyberspace?, Brief History of the Internet, Internet Addiction
Week 2
Reading:
Recommended:
Lecture - Lecture22011.ppt
Assignments:
Malware
Week 3
Reading:
Recommended:
Lecture - Lecture32011.ppt
Assignments:
- Complete Intro to Internet Forensics exercise
- Malware online investigation
- Google "Lori Drew" & "Megan Meier"
Predatory & Exploitation Crimes: Cyber Bullying & Cyber Stalking, Social Networking Sites
Week 4
Reading:
Recommended:
Lecture - Lecture42011.ppt
Assignments:
Predatory & Exploitation Crimes : Pedophilia & Child Pornography
Week 5
Reading:
Recommended:
Lecture - Lecture52011.ppt
Assignments:
- Complete Malware investigation
Predatory & Exploitation Crimes : Child Enticement, Child Molestation & Sexual Tourism
Week 6
Reading:
Recommended:
Lecture - Lecture62011.ppt
Assignments
Financial Crimes I : Credit Card Fraud & Identity Theft
Week 7
Reading:
- Crimes of the Internet - Chapters 7 & 12
Recommended:
Lecture - Lecture72011.ppt
Assignments:
Financial Crimes II: Nigerian 419's, Phishing, & High-Yield Investment Programs (HYIP)
Class 8
Reading:
- Crimes of the Internet - Chapters 10, 11, & 13
Recommended:
Lecture - Lecture82011.ppt
Assignments:
- Phishing & Email Forensics Exercise
Online Pharmaceuticals & Internet Gambling
Class 9
Reading:
Recommended:
Lecture - Lecture92011.ppt
Assignments
- Glavmed and online pharmacy research
Intellectual property Crimes: Piracy, Warez, & File Sharing Web Sites/ Cyber Terrorism & Cyber Warfare
Week 10
Reading:
- Crimes of the Internet - Chapters 18 - 20
- Crimes of the Internet - Chapters 29-31
Recommended:
Lecture - Lecture102011.ppt
Lecture - Lecture102011a.ppt
Assignments:
No Class - Happy Thanksgiving!!
Criminological Perspectives on Cyber Crime: Space Transition Theory, Routine Activity Theory, Neutralization & Social Organization
Week 11
Reading:
- Crimes of the Internet - Chapters 14-17
Recommended:
Lecture - Lecture112011.ppt
Assignments
- Research on domestic or foreign terrorist use of the Internet
Investigating & Prosecuting Cyber Crime
Week 12
Reading:
Recommended:
Lecture - Lecture122011.ppt
Assignments/Quizzes:
- Final Research Projects Due